Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
7AtlasMenu/...ts.url
windows7-x64
1AtlasMenu/...ts.url
windows10-1703-x64
1AtlasMenu/...ts.url
windows10-2004-x64
1AtlasMenu/...ts.url
android-10-x64
AtlasMenu/...ts.url
android-11-x64
AtlasMenu/...ts.url
android-9-x86
AtlasMenu/...ts.url
macos-10.15-amd64
1AtlasMenu/...ts.url
debian-9-armhf
AtlasMenu/...ts.url
debian-9-mips
AtlasMenu/...ts.url
debian-9-mipsel
AtlasMenu/...ts.url
ubuntu-18.04-amd64
AtlasMenu/...er.exe
windows7-x64
7AtlasMenu/...er.exe
windows10-1703-x64
7AtlasMenu/...er.exe
windows10-2004-x64
7AtlasMenu/...er.exe
android-10-x64
AtlasMenu/...er.exe
android-11-x64
AtlasMenu/...er.exe
android-9-x86
AtlasMenu/...er.exe
macos-10.15-amd64
1AtlasMenu/...er.exe
debian-9-armhf
AtlasMenu/...er.exe
debian-9-mips
AtlasMenu/...er.exe
debian-9-mipsel
AtlasMenu/...er.exe
ubuntu-18.04-amd64
Resubmissions
26/08/2023, 19:07
230826-xsvehaed9v 726/08/2023, 19:07
230826-xslscscf74 726/08/2023, 19:02
230826-xpv7maed8v 726/08/2023, 19:01
230826-xpevmsed8s 726/08/2023, 18:59
230826-xm74eacf59 726/08/2023, 18:55
230826-xlarhsed7t 7Analysis
-
max time kernel
690s -
max time network
616s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
26/08/2023, 19:07
Behavioral task
behavioral1
Sample
AtlasMenu/Free cheats.url
Resource
win7-20230824-en
Behavioral task
behavioral2
Sample
AtlasMenu/Free cheats.url
Resource
win10-20230703-en
Behavioral task
behavioral3
Sample
AtlasMenu/Free cheats.url
Resource
win10v2004-20230703-en
Behavioral task
behavioral4
Sample
AtlasMenu/Free cheats.url
Resource
android-x64-20230824-en
Behavioral task
behavioral5
Sample
AtlasMenu/Free cheats.url
Resource
android-x64-arm64-20230824-en
Behavioral task
behavioral6
Sample
AtlasMenu/Free cheats.url
Resource
android-x86-arm-20230824-en
Behavioral task
behavioral7
Sample
AtlasMenu/Free cheats.url
Resource
macos-20220504-en
Behavioral task
behavioral8
Sample
AtlasMenu/Free cheats.url
Resource
debian9-armhf-20221125-en
Behavioral task
behavioral9
Sample
AtlasMenu/Free cheats.url
Resource
debian9-mipsbe-en-20211208
Behavioral task
behavioral10
Sample
AtlasMenu/Free cheats.url
Resource
debian9-mipsel-20221125-en
Behavioral task
behavioral11
Sample
AtlasMenu/Free cheats.url
Resource
ubuntu1804-amd64-20230712-en
Behavioral task
behavioral12
Sample
AtlasMenu/Launcher.exe
Resource
win7-20230712-en
Behavioral task
behavioral13
Sample
AtlasMenu/Launcher.exe
Resource
win10-20230703-en
Behavioral task
behavioral14
Sample
AtlasMenu/Launcher.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral15
Sample
AtlasMenu/Launcher.exe
Resource
android-x64-20230824-en
Behavioral task
behavioral16
Sample
AtlasMenu/Launcher.exe
Resource
android-x64-arm64-20230824-en
Behavioral task
behavioral17
Sample
AtlasMenu/Launcher.exe
Resource
android-x86-arm-20230824-en
Behavioral task
behavioral18
Sample
AtlasMenu/Launcher.exe
Resource
macos-20220504-en
Behavioral task
behavioral19
Sample
AtlasMenu/Launcher.exe
Resource
debian9-armhf-20221125-en
Behavioral task
behavioral20
Sample
AtlasMenu/Launcher.exe
Resource
debian9-mipsbe-20221111-en
Behavioral task
behavioral21
Sample
AtlasMenu/Launcher.exe
Resource
debian9-mipsel-en-20211208
Behavioral task
behavioral22
Sample
AtlasMenu/Launcher.exe
Resource
ubuntu1804-amd64-20230621-en
General
-
Target
AtlasMenu/Launcher.exe
-
Size
3.9MB
-
MD5
d584177d5cc323e38cf83b84ca6a5892
-
SHA1
9e99946c6297fd282e15656388c6b02b16d2d411
-
SHA256
d67ef89bf353873771d073814192d2b63aff0df4aa683a84c60700a3301f0cc0
-
SHA512
4a6407d54ff53660b426c69220fbf9c51e3a2e4701f7635a38b0e1c10ff53e3ff53fc63624eb3884ac55e09b092d6a53536cd85e0b2ef05604bbf028722df6e3
-
SSDEEP
98304:kJamBeGILgwkjR5mXt67Yb04oCdlhsgT/R805MBn1T5:sxBefs3YA7HkJsgLe06Bnr
Malware Config
Signatures
-
resource yara_rule behavioral12/memory/3068-1-0x000000013FC40000-0x0000000140664000-memory.dmp themida behavioral12/memory/3068-2-0x000000013FC40000-0x0000000140664000-memory.dmp themida -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 3016 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1852 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSystemtimePrivilege 1656 cmd.exe Token: SeSystemtimePrivilege 1656 cmd.exe Token: SeDebugPrivilege 1852 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe 1852 taskmgr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1656 wrote to memory of 3016 1656 cmd.exe 37 PID 1656 wrote to memory of 3016 1656 cmd.exe 37 PID 1656 wrote to memory of 3016 1656 cmd.exe 37 PID 660 wrote to memory of 1852 660 cmd.exe 41 PID 660 wrote to memory of 1852 660 cmd.exe 41 PID 660 wrote to memory of 1852 660 cmd.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\AtlasMenu\Launcher.exe"C:\Users\Admin\AppData\Local\Temp\AtlasMenu\Launcher.exe"1⤵PID:3068
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2908
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\system32\ipconfig.exeipconfig2⤵
- Gathers network information
PID:3016
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵PID:2044
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Windows\system32\taskmgr.exetaskmgr2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1852
-